首页 | 本学科首页   官方微博 | 高级检索  
     

Inter-Cluster Routing Authentication for Ad Hoc Networks by a Hierarchical Key Scheme
作者姓名:Yueh-Min Huang  Hua-Yi Lin  and Tzone-I Wang
作者单位:Department of Engineering Science, Cheng Kung University, No.1, Ta-Hsueh Road, Tainan 701, China
摘    要:Dissimilar to traditional networks, the features of mobile wireless devices that can actively form a network without any infrastructure mean that mobile ad hoc networks frequently display partition due to node mobility or link failures. These indicate that an ad hoc network is difficult to provide ou-llne access to a trusted authority server. Therefore, applying traditional Public Key Infrastructure (PKI) security framework to mobile ad hoc networks will cause insecurities. This study proposes a scalable and elastic key management scheme integrated into Cluster Based Secure Routing Protocol (CBSRP) to enhance security and non-repudiation of routing authentication, and introduces an ID-Based internal routing authentication scheme to enhance the routing performance in an internal cluster. Additionally, a method of performing routing authentication between internal and external clusters, as well as inter-cluster routing authentication, is developed. The proposed cluster-based key management scheme distributes trust to an aggregation of cluster heads using a threshold scheme faculty, provides Certificate Authority (CA) with a fault tolerance mechanism to prevent a single point of compromise or failure, and saves CA large repositories from maintaining member certificates, making ad hoc networks robust to malicious behaviors and suitable for numerous mobile devices.

关 键 词:ad  hoc网络  PKI  CBSRP  内簇  布线鉴别
收稿时间:2005-06-08
修稿时间:2005-06-082006-01-12

Inter-Cluster Routing Authentication for Ad Hoc Networks by a Hierarchical Key Scheme
Yueh-Min Huang,Hua-Yi Lin,and Tzone-I Wang.Inter-Cluster Routing Authentication for Ad Hoc Networks by a Hierarchical Key Scheme[J].Journal of Computer Science and Technology,2006,21(6):997-011.
Authors:Yueh-Min Huang  Hua-Yi Lin  Tzone-I Wang
Affiliation:Department of Engineering Science, Cheng Kung University, No.1, Ta-Hsueh Road, Thinan 701, China
Abstract:Dissimilar to traditional networks, the features of mobile wireless devices that can actively form a network without any infrastructure mean that mobile ad hoc networks frequently display partition due to node mobility or link failures. These indicate that an ad hoc network is difficult to provide on-line access to a trusted authority server. Therefore, applying traditional Public Key Infrastructure (PKI) security framework to mobile ad hoc networks will cause insecurities. This study proposes a scalable and elastic key management scheme integrated into Cluster Based Secure Routing Protocol (CBSRP) to enhance security and non-repudiation of routing authentication, and introduces an ID-Based internal routing authentication scheme to enhance the routing performance in an internal cluster. Additionally, a method of performing routing authentication between internal and external clusters, as well as inter-cluster routing authentication, is developed. The proposed cluster-based key management scheme distributes trust to an aggregation of cluster heads using a threshold scheme faculty, provides Certificate Authority (CA) with a fault tolerance mechanism to prevent a single point of compromise or failure, and saves CA large repositories from maintaining member certificates, making ad hoc networks robust to malicious behaviors and suitable for numerous mobile devices.
Keywords:ad hoc network  PKI  CBSRP  ID-based  inter-cluster  cluster-based  CA (Certificate Authority)
本文献已被 CNKI 维普 万方数据 SpringerLink 等数据库收录!
点击此处可从《计算机科学技术学报》浏览原始摘要信息
点击此处可从《计算机科学技术学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号